全文获取类型
收费全文 | 1923篇 |
免费 | 141篇 |
国内免费 | 57篇 |
专业分类
化学 | 345篇 |
晶体学 | 4篇 |
力学 | 213篇 |
综合类 | 45篇 |
数学 | 752篇 |
物理学 | 762篇 |
出版年
2024年 | 2篇 |
2023年 | 29篇 |
2022年 | 72篇 |
2021年 | 49篇 |
2020年 | 47篇 |
2019年 | 39篇 |
2018年 | 36篇 |
2017年 | 51篇 |
2016年 | 58篇 |
2015年 | 62篇 |
2014年 | 128篇 |
2013年 | 143篇 |
2012年 | 89篇 |
2011年 | 113篇 |
2010年 | 108篇 |
2009年 | 129篇 |
2008年 | 126篇 |
2007年 | 117篇 |
2006年 | 80篇 |
2005年 | 73篇 |
2004年 | 55篇 |
2003年 | 58篇 |
2002年 | 55篇 |
2001年 | 46篇 |
2000年 | 35篇 |
1999年 | 44篇 |
1998年 | 36篇 |
1997年 | 34篇 |
1996年 | 29篇 |
1995年 | 28篇 |
1994年 | 32篇 |
1993年 | 22篇 |
1992年 | 15篇 |
1991年 | 15篇 |
1990年 | 4篇 |
1989年 | 5篇 |
1988年 | 10篇 |
1987年 | 8篇 |
1986年 | 6篇 |
1985年 | 1篇 |
1984年 | 5篇 |
1983年 | 2篇 |
1982年 | 2篇 |
1980年 | 3篇 |
1979年 | 3篇 |
1978年 | 3篇 |
1977年 | 3篇 |
1976年 | 6篇 |
1975年 | 2篇 |
1974年 | 3篇 |
排序方式: 共有2121条查询结果,搜索用时 15 毫秒
91.
92.
An enterprise’s private cloud may be attacked by attackers when communicating with the public cloud. Although traffic detection methods based on deep learning have been widely used, these methods rely on a large amount of sample data and cannot quickly detect new attacks such as Zero-day Attacks. Moreover, deep learning has a black-box nature and cannot interpret the detection results, which has certain security risks. This paper proposes an interpretable abnormal traffic detection method, which can complete the detection task with only a few malicious traffic samples. Specifically, it uses the covariance matrix to characterize each traffic category and then calculates the similarity between the query traffic and each category according to the covariance metric function to realize the traffic detection based on few-shot learning. After that, the traffic images processed by the random masks are input into the model to obtain the predicted probability of the corresponding traffic category. Finally, the predicted probability is linearly summed with each mask to generate the final saliency map to interpret and analyze the model decision. In this paper, experiments are carried out by simulating only 15 and 25 malicious traffic samples. The results show that the proposed method can obtain good accuracy and recall, and the interpretation analysis shows that the model is reliable and interpretable. 相似文献
93.
Jose J. López-Espín Antonio M. Vidal Domingo Giménez 《Journal of Computational and Applied Mathematics》2012
This paper analyzes the solution of simultaneous equations models. Efficient algorithms for the two-stage least squares method using QR-decomposition are developed and studied. The reduction of the execution time when the structure of the matrices in each equation is exploited is analyzed theoretically and experimentally. An efficient algorithm for the indirect least squares method is developed. Some techniques are used to accelerate the solution of the problem: parallel versions for multicore systems, and extensive use of the MKL library, thus obtaining efficient, portable versions of the algorithms. 相似文献
94.
We study the time evolution of entanglement of two spins in an anisotropically coupled quantum dot interacting with the unpolarised nuclear spins environment. We assume that the exchange coupling strength in the z direction J z is different from the lateral one J l . We observe that the entanglement decays as a result of the coupling to the nuclear environment and reaches a saturation value, which depends on the value of the exchange interaction difference J = ‖J l ? J z ‖ between the two spins and the strength of the applied external magnetic field. We find that the entanglement exhibits a critical behaviour controlled by the competition between the exchange interaction J and the external magnetic field. The entanglement shows a quasi-symmetric behaviour above and below a critical value of the exchange interaction. It becomes more symmetric as the external magnetic field increases. The entanglement reaches a large saturation value, close to unity, when the exchange interaction is far above or below its critical value and a small one as it closely approaches the critical value. Furthermore, we find that the decay rate profile of entanglement is linear when the exchange interaction is much higher or lower than the critical value but converts to a power law and finally to a Gaussian as the critical value is approached from both directions. The dynamics of entanglement is found to be independent of the exchange interaction for an isotropically coupled quantum dot. 相似文献
95.
《Physics letters. A》2020,384(27):126686
It has recently been argued in Aharonov et al. (2016) that quantum mechanics violates the Pigeon Counting Principle (PCP) which states that if one distributes three pigeons among two boxes there must be at least two pigeons in one of the boxes. However, this conclusion cannot be justified by rigorous theoretical arguments. The issue is further complicated by experimental confirmation of the transition amplitudes predicted in this paper that nevertheless do not support the conclusion of PCP violation. Here we prove via a set of operator identities that the PCP is not violated within quantum mechanics, regardless of interpretation. 相似文献
96.
This paper presents a parallel tabu search algorithm that utilizes several different neighborhood structures for solving the capacitated vehicle routing problem. Single neighborhood or neighborhood combinations are encapsulated in tabu search threads and they cooperate through a solution pool for the purpose of exploiting their joint power. The computational experiments on 32 large scale benchmark instances show that the proposed method is highly effective and competitive, providing new best solutions to four instances while the average deviation of all best solutions found from the collective best results reported in the literature is about 0.22%. We are also able to associate the beneficial use of special neighborhoods with some test instance characteristics and uncover some sources of the collective power of multi-neighborhood cooperation. 相似文献
97.
98.
On this paper, we investigate the algorithm and efficiency of simulation of optical devices using parallel computing method, implement some real wavelength division multiplexing (WDM) components such as resonators to test the method's possibility and efficiency. 相似文献
99.
100.
Reducing ghosting due to k-space discontinuities in fast spin echo (FSE) imaging by a new combination of k-space ordering and parallel imaging 总被引:1,自引:0,他引:1
David W. Carmichael David L. Thomas Roger J. Ordidge 《Journal of magnetic resonance (San Diego, Calif. : 1997)》2009,200(1):119-125
In multi-echo imaging sequences like fast spin echo (FSE), the point spread function (PSF) in the phase encoding direction contains significant secondary peaks (sidebands). This is due to discontinuities in adjacent k-space data obtained at different echo times caused by T2 decay, and leads to ghosting and hence reduced image quality. Recently, utilising multiple coils for signal reception has become the standard configuration for MR systems due to the additional flexibility that parallel imaging (PI) methods can provide. PI methods generally obtain more data than is required to reconstruct an image. Here, this redundancy in information is exploited to reduce discontinuity-related ghosting in FSE imaging. Adjacent phase encoded k-space lines are acquired at different echo times alternately in the regions of discontinuity (called ‘feathering’). This moves the resulting ghost artefacts to the edges of the field of view. This property of the ghost then makes them amenable to removal using PI methods. With ‘feathered’ array coil data it is possible to reconstruct data over the region of the discontinuity from both echo times. By combining this data, a significant reduction in ghosting can be achieved. We show this approach to be effective through simulated and acquired MRI data. 相似文献